ANYONE WITH CRACKED CPANEL OR DOMAIN ACCOUNTS WITH DOMAIN LINKED ?
TAKE
AWS
NEW DOMAINS
HOSTING
VPS
RDP
KEYS SOFTWARES
ADYEN METH
STRIPE METH
CHECKOUT METH
DM @CATH3R
TAKE
AWS
NEW DOMAINS
HOSTING
VPS
RDP
KEYS SOFTWARES
ADYEN METH
STRIPE METH
CHECKOUT METH
DM @CATH3R
๐2
https://crackcodes.in/pialert-network-security-scanner-notification-framework/
PiAlert - Network security scanner & notification framework
๐2
Forwarded from DemonSec
Hoara Online | News, Politics, Stories of Maldives
threat actor: M4D_GH057 (REXX)
https://hoara.mv/
https://mirror-h.org/zone/5575047/
Supp!! Maldives
#Indianhackers
>> Team DemonSec
threat actor: M4D_GH057 (REXX)
https://hoara.mv/
https://mirror-h.org/zone/5575047/
Supp!! Maldives
#Indianhackers
>> Team DemonSec
๐2๐พ1
https://system32.ink/demonized-shell-advanced-tool-for-persistence-in-linux/
Demonized Shell - Advanced Tool For Persistence In Linux
Forwarded from Cybertix
๐๐๐ ๐๐ค๐จ๐ฉ ๐ผ๐๐ซ. ๐ฟ๐ค๐ข๐๐๐ฃ ๐๐ฃ๐ช๐ข๐๐ง๐๐ฉ๐๐ค๐ฃ ๐๐ค๐ค๐ก ๐ฑ๐ฅ
๐๐ค๐ค๐ก ๐๐ฎ: Sanjai Kumar
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ.Efficiency Test with other Tools. โก
๐ฎ.Configuring with API Keys๐
๐ฏ. Notifying the Domain Enumeration ๐
๐๐๐ฉ๐๐ ๐๐ค๐ฌ, ๐ฉ๐ค ๐๐๐ฉ ๐ข๐ค๐ง๐ ๐๐๐ง๐๐๐ฉ๐จ๐ค๐๐ป
๐๐๐ฃ๐ : https://youtu.be/lWPukbNMl70?si=k6_j6byPCrZDG8Zc
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐นโบ๏ธ
๐๐ค๐ค๐ก ๐๐ฎ: Sanjai Kumar
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ.Efficiency Test with other Tools. โก
๐ฎ.Configuring with API Keys๐
๐ฏ. Notifying the Domain Enumeration ๐
๐๐๐ฉ๐๐ ๐๐ค๐ฌ, ๐ฉ๐ค ๐๐๐ฉ ๐ข๐ค๐ง๐ ๐๐๐ง๐๐๐ฉ๐จ๐ค๐๐ป
๐๐๐ฃ๐ : https://youtu.be/lWPukbNMl70?si=k6_j6byPCrZDG8Zc
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐นโบ๏ธ
YouTube
The Most Advance Domain Enumeration ๐ฑ#bugbounty #bugbountytips #cybersecurity #automation #hacking
๐๐๐๐๐
๐ค๐๐๐๐๐๐ค๐:
https://github.com/sanjai-AK47/Subdominator
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/sanjai-AK47/Subdominator
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
System32
HackerGPT
HackerGPT is your indispensable digital companion in the world of hacking. Crafted with the unique needs of ethical hackers in mind, this AI-powered assistant stands at the forefront of hacking knowle
https://system32.ink/hackergpt/
HackerGPT is your indispensable digital companion in the world of hacking. Crafted with the unique needs of ethical hackers in mind, this AI-powered assistant stands at the forefront of hacking knowledge and assistance.
HackerGPT
HackerGPT is your indispensable digital companion in the world of hacking. Crafted with the unique needs of ethical hackers in mind, this AI-powered assistant stands at the forefront of hacking knowledge and assistance.
โก1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
OSINT: How to solve image intelligence (IMINT) challenges from a webcam (CCTV) picture
A walkthrough of a interesting geolocation challenge by @OsintManuelBot59
https://publication.osintambition.org/osint-how-to-solve-image-intelligence-imint-challenges-from-a-webcam-cctv-picture-5ddebe9e1bce
#osint #IMINT #geolocation #challenge #geoint #walkthrough
A walkthrough of a interesting geolocation challenge by @OsintManuelBot59
https://publication.osintambition.org/osint-how-to-solve-image-intelligence-imint-challenges-from-a-webcam-cctv-picture-5ddebe9e1bce
#osint #IMINT #geolocation #challenge #geoint #walkthrough
Medium
๐ฅ๐ฅ # OSINT: How to solve image intelligence (IMINT) challenges from a webcam (CCTV) picture
Open source intelligence (OSINT) is a discipline that consists of collecting, analysing and disseminating public information to obtainโฆ
https://crackcodes.in/bob-the-smuggler-html-smuggling-attack-tool/
Bob the Smuggler - HTML Smuggling Attack Tool
Forwarded from ๐๐๐๐๐๐ ๐๐๐๐๐ ๐
๐๐๐๐
This media is not supported in your browser
VIEW IN TELEGRAM
Blue Horizon Maldives Travel Agency has Been Hacked!
Site > https://blue-horizon.com.mv/
Mirror > https://www.zone-h.org/mirror/id/41104586
#IndianCyberForce
Site > https://blue-horizon.com.mv/
Mirror > https://www.zone-h.org/mirror/id/41104586
#IndianCyberForce
โค5โก1โคโ๐ฅ1
https://system32.ink/taokeyun-sql-injection-vulnerability-cve-2024-0480-exploit/
Taokeyun SQL Injection Vulnerability CVE-2024-0480 Exploit
Forwarded from OSINT AMBITION (Dheeraj Yadav)
How to report if your account gets hacked Impersonated | Working for Indian Citizens only
New video uploaded on yt.
Like, share and subscribe to our channel.
https://youtu.be/cLXiuXkTt9c
Join @osintambition for more.
New video uploaded on yt.
Like, share and subscribe to our channel.
https://youtu.be/cLXiuXkTt9c
Join @osintambition for more.
YouTube
How to report if your account gets hacked Impersonated | Working for Indian Citizens only
Hello everyone, Welcome to our YouTube channel, OSINT Ambition where we upload content related to Privacy, Security and OSINT.
In this video, we have learnt how to report if your account gets hacked/impersonated.
How to report if your account gets hacโฆ
In this video, we have learnt how to report if your account gets hacked/impersonated.
How to report if your account gets hacโฆ
โค2๐1
https://system32.ink/checkmate-payload-execution-by-fake-windows-smartscreen/
Checkmate - Payload Execution by Fake Windows SmartScreen
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Shall we close our YouTube Channel and continue teaching with udemy courses?
Final Results
29%
Yes
60%
No
11%
Who cares
https://system32.ink/ivanti-ics-authentication-bypass-cve-2023-46805-scanner/
Ivanti ICS Authentication Bypass CVE-2023-46805 Scanner
https://system32.ink/korenix-jetnet-series-unauthenticated-cve-2023-5376-or-cve-2023-5347-exploit/
Korenix JetNet Series Unauthenticated CVE-2023-5376, CVE-2023-5347 Exploit
Forwarded from Cybertix
๐๐บ๐ฝ๐ฟ๐ผ๐ฝ๐ฒ๐ฟ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ๐ป๐๐ฟ๐ผ๐น ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ ๐
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฌ๐ฌ๐ฌ$
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/PRwUK00Uhsk?si=ifCw2dnJhBD3QgOr
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฌ๐ฌ๐ฌ$
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/PRwUK00Uhsk?si=ifCw2dnJhBD3QgOr
YouTube
Improper Access Control in Gitlab | Got Bounty of $ 3,000 ๐ฑ#bugbounty #bugbountytips #cybersecurity
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/819821
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/819821
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
Forwarded from OSINT AMBITION (Dheeraj Yadav)
New Article in OSINT Ambition
Unveiling the Mystery: My Journey of Geolocating an Image Using AI Tools and Persistence
https://publication.osintambition.org/unveiling-the-mystery-my-journey-of-geolocating-an-image-using-ai-tools-and-persistence-3f54c960add0
#osint #ai #geoint #geolocation #openstreetmap #overpassturbo
Unveiling the Mystery: My Journey of Geolocating an Image Using AI Tools and Persistence
https://publication.osintambition.org/unveiling-the-mystery-my-journey-of-geolocating-an-image-using-ai-tools-and-persistence-3f54c960add0
#osint #ai #geoint #geolocation #openstreetmap #overpassturbo
Medium
Unveiling the Mystery: My Journey of Geolocating an Image Using AI Tools and Persistence
A write-up of how I use GeoSpy to geolocate a photo โ Disclaimer: Some parts of this article uses AI for minor editโ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
[๐
๐๐๐ ๐๐๐๐๐๐๐๐๐ - ๐๐๐ ๐๐๐๐]
Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.
On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.
You will find below a list of resources for Red Teaming.
๐๐ช๐๐๐ง ๐๐ฆ ๐ฅ๐๐ ๐ง๐๐๐ ?
๐Red Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg
๐Red Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq
๐๐ช๐๐๐ง ๐๐ฅ๐ ๐ฅ๐๐ ๐ง๐๐๐ ๐๐ซ๐๐ฅ๐๐๐ฆ๐๐ฆ?
๐NISTโs Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW
๐Red Team Plan by Magoo
https://lnkd.in/eFUBzxEY
๐Anatomy of a red Exercise (3 chapters) by Cyberforce Offensive Security Team
https://lnkd.in/eWNXrVGx
https://lnkd.in/esvyKQ4Z
https://lnkd.in/ea-9Cxxr
๐๐ง๐๐๐๐ก๐๐ค๐จ๐๐ฆ ๐๐ก๐ ๐ ๐๐ง๐๐ข๐๐ข๐๐ข๐๐๐๐ฆ
๐MITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/
๐Red Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk
๐Red Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4
๐Red Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx
๐๐๐ข๐จ๐ฅ๐ฆ๐๐ฆ ๐๐ก๐ ๐๐๐ก๐๐ฆ ๐ข๐ก
๐Hackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z
๐Responsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn
๐Red Teaming rooms on TryHackme
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m
๐Board games by Hadess | ุญุงุฏุซ
https://lnkd.in/ee2EEyEh
๐๐ง๐ข๐ข๐๐ฆ
๐Red Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH
๐Red Team tools by A-poc
https://lnkd.in/evPBDZRm
๐Red Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4
๐Red Team Ops Cobalt
https://lnkd.in/euMjeFEx
๐๐๐ข๐ก๐จ๐ฆ
๐Red Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db
๐Red Team Village talks
https://lnkd.in/eHwKj5gB
๐A Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR
๐จ ๐๐๐๐๐ - Do you know other resources? Please share them in the comment๐จ
Shared by : @cybertrickzone
Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.
On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.
You will find below a list of resources for Red Teaming.
๐๐ช๐๐๐ง ๐๐ฆ ๐ฅ๐๐ ๐ง๐๐๐ ?
๐Red Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg
๐Red Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq
๐๐ช๐๐๐ง ๐๐ฅ๐ ๐ฅ๐๐ ๐ง๐๐๐ ๐๐ซ๐๐ฅ๐๐๐ฆ๐๐ฆ?
๐NISTโs Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW
๐Red Team Plan by Magoo
https://lnkd.in/eFUBzxEY
๐Anatomy of a red Exercise (3 chapters) by Cyberforce Offensive Security Team
https://lnkd.in/eWNXrVGx
https://lnkd.in/esvyKQ4Z
https://lnkd.in/ea-9Cxxr
๐๐ง๐๐๐๐ก๐๐ค๐จ๐๐ฆ ๐๐ก๐ ๐ ๐๐ง๐๐ข๐๐ข๐๐ข๐๐๐๐ฆ
๐MITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/
๐Red Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk
๐Red Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4
๐Red Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx
๐๐๐ข๐จ๐ฅ๐ฆ๐๐ฆ ๐๐ก๐ ๐๐๐ก๐๐ฆ ๐ข๐ก
๐Hackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z
๐Responsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn
๐Red Teaming rooms on TryHackme
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m
๐Board games by Hadess | ุญุงุฏุซ
https://lnkd.in/ee2EEyEh
๐๐ง๐ข๐ข๐๐ฆ
๐Red Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH
๐Red Team tools by A-poc
https://lnkd.in/evPBDZRm
๐Red Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4
๐Red Team Ops Cobalt
https://lnkd.in/euMjeFEx
๐๐๐ข๐ก๐จ๐ฆ
๐Red Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db
๐Red Team Village talks
https://lnkd.in/eHwKj5gB
๐A Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR
๐จ ๐๐๐๐๐ - Do you know other resources? Please share them in the comment๐จ
Shared by : @cybertrickzone
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
โค1๐1
https://system32.ink/payload-generator-automate-payload-building-in-cobalt-strike/
Payload-Generator - Automate Payload Building in Cobalt Strike